• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    2016-12-05 01:31:30LiuJianhua劉建華WuQianhongLiuJianweiShangTao
    High Technology Letters 2016年2期
    關(guān)鍵詞:劉建華

    Liu Jianhua (劉建華), Wu Qianhong, Liu Jianwei, Shang Tao

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    Liu Jianhua (劉建華)②*, Wu Qianhong**, Liu Jianwei**, Shang Tao**

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as identity-based proxy multi-signature (IBPMS). In this paradigm, multiple proxy signer candidates are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.

    multi-signature, E-transaction, delegation, provable security, information security

    0 Introduction

    Digital signature protocols allow message transmissions among a group of users with non-repudiation, user identification, and message authentication. Many variants of signatures such as blind signature[1], proxy signature[2], multi-proxy signature[3], and proxy multi-signature (PMS for short)[4]have been proposed to meet different application demands, among which, the proxy signature protocol is constructed to empower a signee to issue a message on behalf of another signee.

    Proxy multi-signature plays an critical role in the following scenarios. There may be real estate owned bym(m>1) entities, any legal transaction that wants to sell or rent out the assets must be permitted by all themowners. In other words, it must be signed jointly by all the entities, or signed by their designated proxy signers. For the latter case, any transaction of the real estate needs to be executed with the permission issued by all the owners’ proxy signers. One practical solution to the problem is to allow multiple proxy signers in a proxy multi-signature, each owner has his/her own proxy signer.

    The PMS scheme[5]needs only one round broadcast operation for each original signer during the proxy key generation phase. The proxy multi-signature schemes in Refs[4-6] do not provide formal definition or security model. Cao et al. proposed an ID-based proxy multi-signature scheme which used bilinear pairings[7].

    The existing PMS schemes (e.g., Ref.[5-9]) only allow one proxy signer candidate. This limitation may incur a bottleneck to the PMS schemes in some applications. Multi-proxy multi-signature[10,11]allow multiple original signer to delegate their signing capability to a group of proxy signers. Consider a scenario where a real estate owned by multiple owners needs to be rent out or sold. Suppose the owners delegate their signing capability to some proxy signers. If there is only one single proxy signer allowed to sign on behalf of the owners, then the single proxy signer’s relationships with the owners are different from each other. He/She may issue some transaction documents which will meet some owners’ interests but damage the interests of other owners. To address the drawback, a plausible solution is to allow the owners to choose their own proxy signers, any owner can designate a proxy signer. A transaction document is legal if and only if all the proxy signers sign on it. Another issue in existing PMS schemes is their communication complexity. Each original signer needs two-round broadcast operations. It’s critical to reduce the number of interaction rounds.

    Contribution of the study: Motivated by the above observations and the work of Ref.[12], this work revisits proxy multi-signatures. The contribution consists of two folds. First, a general framework to identity-based proxy multi-signature (IBPMS) is presented. In IBPMS, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates and any proxy signer candidate can sign a document on behalf of all the original signers alone. Second, an IBPMS scheme is proposed which is provably secure under standard computational assumptions. A striking feature of the IBPMS scheme is that it demands only one time of broadcasting operation for each original signer during the proxy key generation phase.

    The rest of this paper is organized as follows. Some background knowledge associated with the work is given in Section 1. The outline of the proxy multi-signature scheme and security model are given in Section 2. In Section 3, a proxy multi- signature scheme from bilinear pairing is presented. Its formal security proofs will be given in Section 4. In Section 5, the efficiency of the proposed scheme is compared with some related work. conclusion is given in Section 6.

    1 Syntax

    In the conventional proxy signature definition, a proxy signer can sign a message on behalf of an original signer under the delegation of the original signer. In Ref.[13], Huang, et al. proposed a security model of a proxy signature scheme. This model is the most widespread used one for the security analysis. A delegation usually is produced by the original signer through an algorithm whose inputs are private key and a certain message. Therefore, a delegation can be seen as a special signature signed by the original signer(In most cases, it is a signature on a warrant).

    Usually, there is only a single proxy signer in a PMS scheme[5-8]. All the original signers delegate their signing capability to one proxy signer. If the designated proxy signer is unavailable for something unexpected, then the protocol will be collapsed. Therefore, the proxy signer may be a bottleneck of a PMS scheme. One efficient solution to reduce the bottleneck effect is to increase the number of proxy signers and each proxy signer can sign a message on behalf of all the original signers separately.

    1.1 Protocol variables and member relationship

    Traditional proxy multi-signature[7]is a type T2scheme, a traditional multi-proxy signature scheme[3]is a type T4scheme, a (t,n) threshold proxy signature schemes[14]is a type T4scheme.

    1.2 Bilinear parings

    The bilinear map can be constructed by suitable modification in Weil[15]or Tate pairings[16]. The group equipped with such a map is called a bilinear group, on which the Decisional Diffie-Hellman problem is able to be solved within a polynomial-time while the computational Diffie-Hellman problem is believed hard[17].

    2 Modelling identity-based proxy multi-signature

    Inspired by the works of Cao, et al.[7], Wang, et al.[18], and Rajeev, et al.[8], and Pointcheval[19], a formal definition and security model for identity-based proxy multi-signature schemes are given.

    2.1 Definition of identity-based proxy multi-signature schemes

    In an identity-based proxy multi-signature scheme, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates, in such a way that any proxy signer candidate can sign a document on behalf of all the original signers alone. LetA1,A2,…,Ambe the original signers andB1,B2,…,Bnbe the proxy signer candidates designated byA1,A2,…,Am. For 1≤i≤m, Aihas an identity IDAi, for 1≤j≤n,Bjhas an identity IDBj.

    Definition 1 An identity-based proxy multi-signature scheme is a tuple IBPMS=(Setup; Extract; Sign; Veri; PMGen; PMSign; PMVeriT).

    Setup: On the input security parameterl, PKG generates public parametersParaof the system and a master secret keys. PKG publishesParaand keeps confidential master keys.

    Extract: Input master secret keys, public parametersParaand an identityID, and output the private keySIDofID. PKG will use this algorithm to generate private keys for all entities participating in the scheme and send the private keys to their respective owners through a secure channel.

    PMGen: This is a protocol jointly executed by all the candidate proxy signers and all original signers. Input IDA1,…,IDAm,IDB1,…,IDBn, the original signers’ private keys SIDA1,…,SIDAmand the delegation warrant ω which includes the type of the information delegated, the period of delegation, all the candidate proxy signers, etc. Any candidate proxy signerBj(j=1,…,n) can output a proxy signing key skBjby inputting his secret key SIDBj. The proxy signing key skBjcan be used byBjto produce proxy multi-signature on behalf of the original signers.

    2.2 Security model

    A formal security model for an identity-based proxy multi-signature scheme based on the work of Refs[7,8,20] is given. It is considered that adversary A tries to forge a proxy multi-signature working against a single honest user 1. User 1 can be an original signer or a proxy signer adaptively. A is allowed to access standard signing oracle, delegation oracle, and proxy multi-signature oracle.

    The goal of adversary A is to produce one of the following forgeries:

    Consider the following game:

    (1) Setup: The challenger runs the algorithm Setup of the proxy multi-signature scheme and provides the public parametersParato A.

    (2) Hash query: A can access the hash oracle, challenger X responds through the hash oracle and maintains LH1, LH2and LH3for each hash query.

    (3) Extract query: Adversary A can ask for the private key of any user IDi(IDi≠ID1). The challenger responds by running the Extract algorithm and returns the private key SIDito A.

    (5) Delegation query: A is allowed to request for the proxy signing key on the warrant ω and the identity IDi(IDi≠ID1). The user 1 may be either one of the original signers or one of the proxy signers.

    Definition 2 ID-based proxy multi-signature forger A (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks them+nusers ID-based proxy multi-signature scheme by the adaptive chosen message and givenIDattack if: A runs in time at mostt, and A makes at mostqHqueries to the hash queries, at mostqEqueries to the extraction queries, at mostqsqueries to the signing queries, at mostqpsqueries to the delegation queries and at mostqpmsqueries to the proxy multi-signature queries, and the success probability of A is ε at least.

    Definition 3 An ID-based proxy multi-signature scheme is (t,qH,qE,qs,qps,qpms,m+n,ε)-secure against adaptive chosen message and givenIDattack, if there is no adversary who can (t,qH,qE,qs,qps,qpms,m+n,ε)-break it.

    3 Proposed identity-based proxy multi- signature scheme

    In this section, an identity-based proxy multi-signature (IBPMS for short) scheme is presented based on the ID-based aggregate signature scheme[12]and IBPMS scheme[8]. The scheme has following phases: Setup, Extract, Sign, Veri, PMGen, PMSign, PMVeri.

    Extract: For a user withID, PKG computes its public key as QID=H1(ID)∈G1and private key asSID=sQID. Thus original signerAi, has its public key QAi(for i=1,…,m) and corresponding private key SIDAi. Similarly, for thenproxy signers, the public keys are QIDBjand corresponding private keys are SIDBj(forj=1,…,n).

    The Sign and Veri algorithm above is the same algorithm as the Shim’s IBS scheme[12], and for short the Shim’s IBS scheme is denoted as SIBS.

    PMGen: In this phase, the original signers perform the following job to make a message warrant ω, jointly with the proxy signers. ω includes some specific information about the message, restrictions on the message, time of delegation, identity of original and proxy signers, period of validity, and so on. Unlike the traditional proxy multi-signature schemes, the warrant ω in our scheme will declare a proxy signer group {Bj|1≤j≤n}, any Bjcan sign a message on the behalf of the original signers {Ai|1≤i≤m}.

    WBj=skBj+xjh4Ppub

    2. Checks whether or not the proxy signerBjis on the authorized list in the warrant ω. If not, stop. Otherwise, continue.

    Our PMS scheme allowsncandidates of proxy signingB1,…,Bn. Ifn=1, then our PMS scheme is a traditional PMS scheme, namely a T2proxy signature scheme; Ifn>1, then the PMS scheme is a T5proxy signature scheme.

    If set the number of proxy signersn>1 in the PMS scheme, and use the PMS scheme to be a traditional PMS scheme, that is to say, a message can be checked as valid when one of the proxy signers signs on it. In this situation, the proposed PMS scheme enjoys better robustness than a traditional PMS scheme, because, a traditional PMS scheme will not work if the unique proxy signer is not available. Thus a T5scheme enjoys better robustness than a T2scheme if a message needs only one proxy signer to sign on it.

    An e-transaction application instance: Suppose there is a real estate owned by multiple entities needed to be sold out. The owners authorize proxy signers to sign e-transaction documents. If there is only one single proxy signer allowed to sign messages on behalf of all the owners, then how to choose the single proxy signer admitted by all owners is another open problem. The relationship between the single proxy signer and ownerAiis different from that between the single proxy signer and owner Aj(i≠j). By using the proposed PMS scheme, each owner is allowed to choose her/his own proxy signer, thenmoriginal signers havenproxy signers, therem=n. Any e-transaction document can be verified as valid only if all thenproxy signers sign on it. The whole process containsmtimes PMSign signing andmtimes PMVeri verifying.

    4 Analysis of the scheme

    4.1 Correctness

    1. The correctness of delegation process:

    2. The correctness of PMSign and PMVeri algorithms from the following equalities:

    4.2 Security proof

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms)

    +(1-1/(qE+1))qs+qps+qpms)-1ε’

    t≤t’-CG1(qH1+qH2+qH3+qH4+2qE

    +3qs+3qps+3qpms+9)

    whereeis the base of natural logarithms, and CG1is the time of computing a scalar multiplication and inversion onG1.

    Proof. Suppose adversary (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks the proxy multi-signature scheme. X is given X=xP and Y=yP. Its goal is to output xY=xyP. X interacts with A as follows:

    Setup: Algorithm X initializes A withPpub=Xas a system’s master public key. A selects an identityID1.

    H1-queries: At any time A can query the random oracle OH1. To respond to these queries, X maintains a list LH1of tuples (IDi,Qi,bi,ci) . When an identityIDiis submitted to the OH1, X responds as follows:

    (1) If the queryIDialready appears on the list LH1in some tuple (IDi,Qi,bi,ci), then algorithm X responds withH1(IDi)=Qi.

    (2) Otherwise, X generates a random coin c∈{0,1} such that Pr[c=0]=λ.

    (4) Algorithm X adds the tuple (IDi,Qi,bi,ci) to the list LH1and responds to A withH1(IDi)=Qi.

    H2-queries: A can query the random oracle OH2. X maintains a list LH2of tuples (ωi,vi). When a warrant ωiis submitted to the OH2, X responds as follows:

    (1) If the query ωialready appears on the list LH2in some tuple (ωi,vi) then algorithm X responds with H2(ωi)=vi.

    H3-queries: At any time A can query the random oracle OH3with (ω,V). X maintains a list LH3of tuples (ω,V,η). X responds as follows:

    Extraction queries: Let IDi(i≠1) be a private key extraction query issued by algorithm A.

    (1) X runs the above algorithm for responding toH1-queries to obtain a Qi∈G1such that H1(IDi)=Qi. Let (IDi,Qi,bi,ci) be the corresponding tuple on the list LH1. Ifci=0, then X outputs “failure” and terminates.

    (2) Otherwiseci=1 and Qi=biP. Define SIDi=biPpub. It is seen that SIDi=bixP=xQiand therefore SIDiis the private key associated with the public keyIDi. Returns SIDi. The probability of success is 1-λ.

    Delegation queries:

    Case 2: A requests to interact withID1, whereID1plays the role of one of the original signers. To responds to this query, A generates a warrant ω, and requestsID1to sign ω and receives a response (WA1,VA1,ω). X returns a partial proxy signing key skBjwhich involves (WA1,VA1,ω) and adds ((WA1,VA1),…,(WAm,VAm),ω,skBj) to Lpso.

    Hence the above provided proxy signing key which involves (WAi,VAi) is valid. The probability of success is 1-λ.

    (2) X runs the above algorithm for responding toH2-queries on ω, recovers (ω,v) on LH2list.

    (3) Ifc= 0, then X returns “failure” and terminates. Ifc=1, H1(IDAi)=bAiP or H1(IDBj)=bBjP.

    Hence, the probability thatCdoes not abort during the simulation is (1-λ)qE+qps+qpms.

    Output: If X does not terminate as a result of A’s extraction query and proxy multi-signature query, then A’s view is identical to its view in the real attack.

    And it holds that

    X succeeds if all of these events happen.

    Pr[E1∧E2∧E3]

    =Pr[E1]Pr[E2|E1]Pr[E3|E1∧E2].

    Since A makes at mostqEqueries to the Extraction oracle and Pr[c=1]=1-λ, then Pr[E1]=λ(1-λ)qE. If X does not abort as a result of A ’s Extraction query then A ’s view is identical to its view in the real attack. Hence, Pr[E2|E1]≥ε. X will abort only if A generates a forgery such thatc=1. Hence, Pr[E3|E1∧E2]≥1/(1-λ). Thus, the probability of success is at least λ(1-λ)qEε.

    Hence the success probability that X solves the CDHP in the above game is at least:

    ((1-λ)qE+(1-λ)qE+qpms+(1-λ)qE+qs+qps+qpms)λε Set λ=1/(qE+1), we can deduce that

    ((1-1/(qE+1))qE+(1-1/(qE+1))qE+qpms+(1-1/(qE+1))qE+qs+qps+qpms)1/(qE+1)ε≥(1/e)·1/(qE+1)·(1+(1-1/(qE+1))qpms+(1-1/(qE+1))qE+qs+qps+qpms)ε≥ε′.

    Therefore

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms

    +(1-1/(qE+1))qE+qs+qps+qpms)-1ε′

    For the running time, one can observe that the running time of X is the same as A running time plus the time taken to respond to qH1,qH2,qH3,qH4hash queries,qEextraction queries,qssigning queries,qpsdelegation queries andqpmsproxy multi-signature queries, and the time to transform A ’s final forgery into the CDH solution. Hence, the total running time is at most t+CG1(qH1+qH2+qH3+qH4+2qE+3qs+3qps+3qpms+9)≤t′ as required.

    5 Comparison

    The efficiency of the scheme is compared with the schemes in Refs[6-8]. In Table 1,Edenotes the exponentiation operation inG2,Mdenotes the point scalar multiplication operation inG1,Pdenotes the pairing operation and NoPS denotes the number of proxy signer candidates. The broadcasting round in which each original signer needs to execute in the PMGen is denoted by BREO.

    Table 1 Performance analysis

    From Table 1, it can be seen that the proposed scheme is more efficient than the schemes in Refs[6-8]. Especially, the PMS scheme demands only one round broadcasting operation for each original signer, and the proxy signer candidates is not unique. These two characteristics make our PMS scheme more practical and efficient than the other schemes. It is supposed a valid message only needs the signature of one of the proxy signers.

    6 Conclusion

    In this work, a novel proxy multi-signature scheme is presented. The proposed proxy multi-signature scheme demands only one round broadcasting operation for each original signer during the proxy key generation phase. The scheme allows multiple proxy signers, improves the reliability of the PMS scheme. A formal security proof for the proposed scheme is also proposed.

    [1] Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In: Proceeding of the Public Key Cryptography, Miami, USA, 2003. 31-46

    [2] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages.IEICETransactionsonFundamentalsofElectronicsCommunications&ComputerSciences, 1996, E79-A(9):1338-1353

    [3] Cao F, Cao Z F. A secure identity-based multi-proxy signature scheme.ComputersandElectricalEngineering,2009, 35:86-95

    [4] Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme.ElectronicsLetters, 2000, (36):527-528

    [5] Li X X, Chen K F, Li S Q. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Proceedings of the 5th International Conference on Parallel and Distributed Computing, Application and Technologies, Singapore, 2004, 2004.591-595

    [6] Li X X, Chen K F. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.AppliedMathematicsandComputation, 2005,169(1):437-450

    [7] Cao F, Cao Z. A secure identity-based proxy multi-signature scheme.InformationSciences, 2009, 179(3):292-302

    [8] Rajeev A S, Sahadeo P. Efficient ID-based proxy multisignature scheme secure in random oracle.FrontiersofComputerScience, 2012, 6(4):421-428

    [9] Du H, Wen Q. Certificateless proxy multi-signature.InformationSciences, 2014, 276:21-30

    [10] Asaar M R, Salmasizadeh M, Susilo W. An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants.ComputerJournal, 2013,58(4):1021-1039

    [11] Sahu R A, Padhye S. Identity-based multi-proxy multisignature scheme provably secure in random oracle model.TransactionsonEmergingTelecommunicationsTechnologies, 2015,26(4):547-558

    [12] Shim K. An ID-based aggregate signature scheme with constant pairing computations.TheJournalofSystemsandSoft-ware, 2010, 83:1873-1880

    [13] Huang X Y, Mu Y, Willey S, et al. Proxy signature without random oracles. In: Proceedings of the Mobile ad-hoc and Sensor Networks, Hong Kong, China, 2006. 473-484

    [14] Zhang K. Threshold proxy signature schemes.LectureNotesinComputerScience, 1997, 1396: 191-197

    [15] Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proceedings of the Crypto, Santa Barbara, USA, 2001. 213-229

    [16] Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for fr-reduction.IEICETransactionsonFundamentals, 2001, 5:1234-1243

    [17] Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In: Proceedings of the Public key Cryptopraphy, Cheju Island, Korea, 2001. 104-118

    [18] Wang Q, Cao Z, Wang S. Formalized security model of multiproxy signature schemes. In: Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, China, 2005. 668-672

    [19] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures.JournalofCryptology, 2000, 13:361-396

    [20] Shao Z. Improvement of identity-based proxy multi-signature scheme.JournalofSystemsandSoftware, 2009, 85:794-800

    Liu Jianhua, born in 1983. He received his Ph.D degrees in School of Electronic and Information Engineering of Beihang University in 2013. He also received his B.S. and M.S. degrees from China West Normal University in 2006 and 2009 respectively. His research interests include information security.

    10.3772/j.issn.1006-6748.2016.02.012

    ①Supported by the National Basic Research Program of China (No. 2012CB315905), the National Natural Science Foundation of China (No. 61272501), the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China (No. J2013-31, Q2014-48).

    ②To whom correspondence should be addressed. E-mail: ljh2583265@163.comReceived on Aug. 22, 2015

    猜你喜歡
    劉建華
    學(xué)走鋼絲的樂樂羊
    凡事無絕對
    你不知道的“胡”“番”“?!薄把蟆?/a>
    有趣的“兒化”
    摘蘋果
    幼兒園(2020年17期)2020-12-30 12:22:50
    “灬”表示什么
    大雪人
    大白鵝
    搟面條
    掉鞭炮
    国产一区二区在线av高清观看| 久久香蕉精品热| 亚洲午夜理论影院| 窝窝影院91人妻| 国产成人啪精品午夜网站| av网站在线播放免费| 18禁裸乳无遮挡免费网站照片 | 日本黄色视频三级网站网址| 精品高清国产在线一区| 精品一区二区三区四区五区乱码| 69av精品久久久久久| 久久久久久久精品吃奶| 美女午夜性视频免费| 最近最新中文字幕大全电影3 | 国产激情欧美一区二区| 很黄的视频免费| 很黄的视频免费| x7x7x7水蜜桃| 视频区图区小说| 亚洲人成电影免费在线| 中文字幕色久视频| 91麻豆av在线| 91麻豆av在线| 国产成人一区二区三区免费视频网站| 精品熟女少妇八av免费久了| 欧美日韩视频精品一区| 久久精品亚洲av国产电影网| 国产黄色免费在线视频| 久久亚洲真实| 黄频高清免费视频| 亚洲精品中文字幕一二三四区| 国产免费现黄频在线看| 狠狠狠狠99中文字幕| 欧美日韩福利视频一区二区| 国产激情欧美一区二区| 12—13女人毛片做爰片一| 欧美午夜高清在线| 欧美成人性av电影在线观看| 91麻豆av在线| 曰老女人黄片| www.自偷自拍.com| 女生性感内裤真人,穿戴方法视频| 色精品久久人妻99蜜桃| 国产精品久久电影中文字幕| 不卡av一区二区三区| 久久欧美精品欧美久久欧美| 亚洲精品粉嫩美女一区| 久9热在线精品视频| 正在播放国产对白刺激| 一二三四在线观看免费中文在| 色在线成人网| 精品国产乱码久久久久久男人| 欧美日韩一级在线毛片| 欧美大码av| 久久久久国产精品人妻aⅴ院| 婷婷精品国产亚洲av在线| 人人妻人人爽人人添夜夜欢视频| 国产精品久久视频播放| 少妇的丰满在线观看| 免费在线观看日本一区| 亚洲成人久久性| 午夜福利,免费看| 啪啪无遮挡十八禁网站| 精品久久久久久成人av| 老熟妇乱子伦视频在线观看| 成人三级黄色视频| 国产亚洲精品久久久久5区| 中文字幕人妻熟女乱码| 窝窝影院91人妻| 麻豆久久精品国产亚洲av | 久久人人爽av亚洲精品天堂| 一级黄色大片毛片| 亚洲av美国av| 一进一出抽搐动态| 久久 成人 亚洲| 欧美日韩亚洲高清精品| 成人亚洲精品一区在线观看| 美女 人体艺术 gogo| 黄色毛片三级朝国网站| 乱人伦中国视频| 久久久久久久午夜电影 | 亚洲美女黄片视频| 亚洲国产精品一区二区三区在线| 老司机福利观看| www日本在线高清视频| 国产精品久久久av美女十八| 性色av乱码一区二区三区2| 99久久国产精品久久久| 亚洲欧美一区二区三区久久| 日本欧美视频一区| 一级片免费观看大全| 熟女少妇亚洲综合色aaa.| 久久久久国产精品人妻aⅴ院| 久久国产精品男人的天堂亚洲| 91成年电影在线观看| 人人妻人人澡人人看| 热re99久久国产66热| 美女国产高潮福利片在线看| 亚洲成人国产一区在线观看| 电影成人av| aaaaa片日本免费| 久久精品国产99精品国产亚洲性色 | 岛国视频午夜一区免费看| 日本a在线网址| 在线观看午夜福利视频| 女警被强在线播放| 人人妻人人澡人人看| 成熟少妇高潮喷水视频| 免费在线观看亚洲国产| 中出人妻视频一区二区| svipshipincom国产片| 免费一级毛片在线播放高清视频 | 欧美日韩黄片免| 亚洲一区二区三区色噜噜 | 国产精品二区激情视频| 天堂√8在线中文| 在线天堂中文资源库| 亚洲人成电影观看| 怎么达到女性高潮| 老熟妇仑乱视频hdxx| 亚洲av五月六月丁香网| av视频免费观看在线观看| 中国美女看黄片| 久久午夜综合久久蜜桃| 国产精品综合久久久久久久免费 | 久久中文字幕一级| √禁漫天堂资源中文www| 黄色成人免费大全| 亚洲熟妇中文字幕五十中出 | 日韩 欧美 亚洲 中文字幕| a级毛片在线看网站| 国产精品永久免费网站| 色哟哟哟哟哟哟| 国产高清激情床上av| 亚洲av电影在线进入| 免费少妇av软件| 欧美+亚洲+日韩+国产| 久久中文看片网| 国产黄a三级三级三级人| 69av精品久久久久久| 在线观看日韩欧美| 视频区图区小说| 老司机福利观看| 中文字幕av电影在线播放| 亚洲国产精品合色在线| 悠悠久久av| 男人舔女人下体高潮全视频| www.999成人在线观看| 丝袜美腿诱惑在线| 午夜福利在线观看吧| x7x7x7水蜜桃| 国产精品电影一区二区三区| 国产野战对白在线观看| 国产精品久久视频播放| 国产精品电影一区二区三区| 搡老岳熟女国产| 亚洲欧美一区二区三区黑人| 久久草成人影院| 少妇 在线观看| 宅男免费午夜| 国产精品秋霞免费鲁丝片| 精品久久久精品久久久| 国产蜜桃级精品一区二区三区| 99riav亚洲国产免费| 欧美久久黑人一区二区| www.自偷自拍.com| 啪啪无遮挡十八禁网站| 看免费av毛片| 女人高潮潮喷娇喘18禁视频| 亚洲五月天丁香| 欧美久久黑人一区二区| 国产av在哪里看| 日日干狠狠操夜夜爽| 免费久久久久久久精品成人欧美视频| 亚洲精品国产区一区二| 少妇裸体淫交视频免费看高清 | 一二三四在线观看免费中文在| 中文字幕人妻丝袜一区二区| 91麻豆av在线| 天堂俺去俺来也www色官网| 女生性感内裤真人,穿戴方法视频| 欧美黄色淫秽网站| 久久国产精品影院| 亚洲熟妇熟女久久| 欧美成人免费av一区二区三区| 国产视频一区二区在线看| 黄色视频不卡| 夫妻午夜视频| 好男人电影高清在线观看| 亚洲欧美一区二区三区黑人| av国产精品久久久久影院| 男女午夜视频在线观看| 桃红色精品国产亚洲av| 在线观看舔阴道视频| av欧美777| 中文欧美无线码| 韩国av一区二区三区四区| 两个人免费观看高清视频| 欧美人与性动交α欧美精品济南到| 国产成+人综合+亚洲专区| 日韩欧美一区视频在线观看| 欧美人与性动交α欧美精品济南到| 精品国产乱子伦一区二区三区| 九色亚洲精品在线播放| 99久久久亚洲精品蜜臀av| 又紧又爽又黄一区二区| 大型黄色视频在线免费观看| 亚洲av成人av| 国产欧美日韩综合在线一区二区| 亚洲精品久久午夜乱码| 每晚都被弄得嗷嗷叫到高潮| 国产蜜桃级精品一区二区三区| 18禁国产床啪视频网站| 18美女黄网站色大片免费观看| 国产av一区在线观看免费| 水蜜桃什么品种好| 韩国精品一区二区三区| 亚洲第一青青草原| 交换朋友夫妻互换小说| 久久久久国产一级毛片高清牌| 日韩大尺度精品在线看网址 | 欧美激情久久久久久爽电影 | 最好的美女福利视频网| 一个人免费在线观看的高清视频| 国产成人av教育| 久久热在线av| 久热爱精品视频在线9| 精品一区二区三区视频在线观看免费 | 精品国内亚洲2022精品成人| 欧美精品亚洲一区二区| 婷婷精品国产亚洲av在线| 国产午夜精品久久久久久| 两性夫妻黄色片| www国产在线视频色| 欧美大码av| 中文字幕精品免费在线观看视频| 亚洲中文字幕日韩| 亚洲国产看品久久| 欧美日韩乱码在线| 日本一区二区免费在线视频| 国产成人av激情在线播放| 国产熟女午夜一区二区三区| 久久久久精品国产欧美久久久| 在线十欧美十亚洲十日本专区| 韩国精品一区二区三区| 国产三级黄色录像| 免费不卡黄色视频| 日日摸夜夜添夜夜添小说| 久久香蕉精品热| 亚洲国产看品久久| 日韩av在线大香蕉| 久久久久国产一级毛片高清牌| 免费在线观看视频国产中文字幕亚洲| 亚洲av成人不卡在线观看播放网| 99在线人妻在线中文字幕| 制服诱惑二区| 9色porny在线观看| 悠悠久久av| 午夜福利在线免费观看网站| 久久久久久久久久久久大奶| 亚洲色图 男人天堂 中文字幕| 伦理电影免费视频| 国产成+人综合+亚洲专区| 黄色 视频免费看| 亚洲精品一二三| 久久精品91无色码中文字幕| 中出人妻视频一区二区| 欧美 亚洲 国产 日韩一| 欧美+亚洲+日韩+国产| 成年人免费黄色播放视频| 久久久久九九精品影院| 国产精品永久免费网站| 国产精品乱码一区二三区的特点 | 黄色怎么调成土黄色| 亚洲精品一卡2卡三卡4卡5卡| 在线永久观看黄色视频| 欧美日韩福利视频一区二区| 好看av亚洲va欧美ⅴa在| av在线播放免费不卡| 99精品久久久久人妻精品| 欧美人与性动交α欧美软件| 日韩欧美一区视频在线观看| 免费女性裸体啪啪无遮挡网站| 国产成人一区二区三区免费视频网站| 欧美精品啪啪一区二区三区| 国产精品免费一区二区三区在线| 视频区图区小说| 欧美日韩精品网址| 天堂动漫精品| 亚洲欧美精品综合久久99| 热re99久久精品国产66热6| 国产精品av久久久久免费| 日韩欧美在线二视频| 欧美一区二区精品小视频在线| 国产一区二区激情短视频| bbb黄色大片| 亚洲一区中文字幕在线| 长腿黑丝高跟| 夜夜夜夜夜久久久久| 男男h啪啪无遮挡| 亚洲国产欧美日韩在线播放| 美女高潮喷水抽搐中文字幕| 日韩人妻精品一区2区三区| 女人精品久久久久毛片| 久久 成人 亚洲| 日韩免费高清中文字幕av| 午夜免费成人在线视频| 久久中文字幕一级| 色综合欧美亚洲国产小说| 老司机在亚洲福利影院| 久久狼人影院| 一边摸一边抽搐一进一小说| 精品久久久久久久久久免费视频 | 一进一出好大好爽视频| 午夜精品久久久久久毛片777| 亚洲精品av麻豆狂野| 亚洲伊人色综图| 亚洲国产精品一区二区三区在线| 国产精品一区二区免费欧美| 成人国产一区最新在线观看| 俄罗斯特黄特色一大片| 国产高清videossex| 老熟妇仑乱视频hdxx| 一个人免费在线观看的高清视频| 欧美中文日本在线观看视频| 美女国产高潮福利片在线看| 中文字幕人妻丝袜一区二区| 久久精品国产99精品国产亚洲性色 | 午夜免费激情av| 精品国内亚洲2022精品成人| 女人高潮潮喷娇喘18禁视频| 高清黄色对白视频在线免费看| 午夜免费鲁丝| 成人国产一区最新在线观看| 久久亚洲真实| 国产日韩一区二区三区精品不卡| 国产亚洲精品综合一区在线观看 | 淫妇啪啪啪对白视频| 老司机在亚洲福利影院| 亚洲成人精品中文字幕电影 | 国产精品日韩av在线免费观看 | 国产一卡二卡三卡精品| 啪啪无遮挡十八禁网站| 50天的宝宝边吃奶边哭怎么回事| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美日韩一级在线毛片| 黑人操中国人逼视频| 日韩免费av在线播放| 黄色视频不卡| 嫩草影院精品99| 精品午夜福利视频在线观看一区| 国产熟女xx| 亚洲自拍偷在线| 久久久久久大精品| e午夜精品久久久久久久| 中文字幕av电影在线播放| 亚洲成人免费电影在线观看| 欧美黑人精品巨大| 一夜夜www| 琪琪午夜伦伦电影理论片6080| 中国美女看黄片| e午夜精品久久久久久久| 少妇 在线观看| 国产又爽黄色视频| 中文字幕另类日韩欧美亚洲嫩草| 午夜免费激情av| 高清在线国产一区| 午夜福利影视在线免费观看| 丝袜在线中文字幕| 欧美黑人精品巨大| 国产精品亚洲av一区麻豆| 精品卡一卡二卡四卡免费| 纯流量卡能插随身wifi吗| 中文字幕另类日韩欧美亚洲嫩草| 中文字幕人妻熟女乱码| 精品久久久久久久久久免费视频 | 午夜精品久久久久久毛片777| 香蕉久久夜色| 免费看a级黄色片| 亚洲久久久国产精品| 人成视频在线观看免费观看| 国产成人影院久久av| 高潮久久久久久久久久久不卡| 久久精品亚洲熟妇少妇任你| 午夜视频精品福利| 午夜影院日韩av| 亚洲精品国产精品久久久不卡| 日韩人妻精品一区2区三区| 老司机福利观看| av电影中文网址| 久久精品亚洲熟妇少妇任你| 精品人妻1区二区| 亚洲,欧美精品.| 夜夜爽天天搞| 精品久久久久久成人av| 岛国在线观看网站| 乱人伦中国视频| 国产精品九九99| 满18在线观看网站| 国产精品秋霞免费鲁丝片| 久久久久久久久免费视频了| 国产精品乱码一区二三区的特点 | 高清毛片免费观看视频网站 | 欧美一级毛片孕妇| 男男h啪啪无遮挡| 亚洲一区二区三区色噜噜 | 国产三级在线视频| 久热这里只有精品99| 亚洲精品美女久久av网站| cao死你这个sao货| 女警被强在线播放| 制服人妻中文乱码| 亚洲欧美精品综合一区二区三区| 亚洲片人在线观看| 天堂中文最新版在线下载| 69精品国产乱码久久久| 欧美久久黑人一区二区| 亚洲成人免费电影在线观看| 日韩精品免费视频一区二区三区| 香蕉丝袜av| 亚洲免费av在线视频| xxxhd国产人妻xxx| a级毛片黄视频| 男人舔女人下体高潮全视频| 免费女性裸体啪啪无遮挡网站| 老司机午夜十八禁免费视频| 怎么达到女性高潮| 不卡一级毛片| 国产欧美日韩一区二区三区在线| 黄色女人牲交| cao死你这个sao货| 亚洲免费av在线视频| 精品卡一卡二卡四卡免费| 999久久久精品免费观看国产| 老司机靠b影院| 亚洲精品美女久久久久99蜜臀| 大香蕉久久成人网| 视频区图区小说| 黄色怎么调成土黄色| 亚洲成人免费电影在线观看| 在线天堂中文资源库| 国产精品成人在线| 黄色怎么调成土黄色| 999久久久国产精品视频| 19禁男女啪啪无遮挡网站| 电影成人av| 精品久久久久久成人av| 亚洲专区字幕在线| 亚洲精品一区av在线观看| 一个人免费在线观看的高清视频| 真人一进一出gif抽搐免费| 在线观看免费日韩欧美大片| 亚洲免费av在线视频| 色尼玛亚洲综合影院| 亚洲av成人一区二区三| 少妇粗大呻吟视频| 免费av毛片视频| 亚洲一码二码三码区别大吗| 两人在一起打扑克的视频| 精品卡一卡二卡四卡免费| 亚洲国产欧美日韩在线播放| 久热这里只有精品99| 成人国语在线视频| 亚洲 欧美 日韩 在线 免费| 国产成人精品在线电影| 欧美一级毛片孕妇| 天堂俺去俺来也www色官网| 亚洲精华国产精华精| 搡老乐熟女国产| 又黄又粗又硬又大视频| 亚洲成av片中文字幕在线观看| 免费在线观看黄色视频的| 欧美另类亚洲清纯唯美| 国产精品综合久久久久久久免费 | 视频区图区小说| 国产精品99久久99久久久不卡| av欧美777| 久久精品91无色码中文字幕| √禁漫天堂资源中文www| 国产av在哪里看| 啪啪无遮挡十八禁网站| 性少妇av在线| 亚洲五月色婷婷综合| 国产精品久久久人人做人人爽| 在线看a的网站| 人妻久久中文字幕网| 曰老女人黄片| 神马国产精品三级电影在线观看 | 我的亚洲天堂| 动漫黄色视频在线观看| 欧美黄色片欧美黄色片| 色精品久久人妻99蜜桃| 怎么达到女性高潮| 18禁观看日本| 免费观看人在逋| 高清av免费在线| 亚洲av五月六月丁香网| 1024香蕉在线观看| 一夜夜www| 人人妻人人澡人人看| 一级黄色大片毛片| 久久亚洲精品不卡| 久久久久九九精品影院| 99国产精品99久久久久| 亚洲av成人不卡在线观看播放网| 欧美日韩乱码在线| 亚洲男人的天堂狠狠| 99久久99久久久精品蜜桃| 91成人精品电影| 色精品久久人妻99蜜桃| 欧美精品啪啪一区二区三区| 少妇粗大呻吟视频| 日本黄色视频三级网站网址| 亚洲av成人av| 一区在线观看完整版| 在线播放国产精品三级| 动漫黄色视频在线观看| 人人妻人人爽人人添夜夜欢视频| 男女之事视频高清在线观看| tocl精华| 在线播放国产精品三级| 亚洲一区中文字幕在线| 国产精品98久久久久久宅男小说| 韩国精品一区二区三区| 国产三级黄色录像| 美女高潮到喷水免费观看| 免费久久久久久久精品成人欧美视频| 国产精品1区2区在线观看.| 天堂√8在线中文| 亚洲精品国产一区二区精华液| 成人av一区二区三区在线看| av在线天堂中文字幕 | 视频在线观看一区二区三区| 99精品在免费线老司机午夜| 婷婷精品国产亚洲av在线| 黄频高清免费视频| 夜夜躁狠狠躁天天躁| 午夜a级毛片| 色精品久久人妻99蜜桃| 色老头精品视频在线观看| 一个人免费在线观看的高清视频| 午夜成年电影在线免费观看| 欧美+亚洲+日韩+国产| 日韩人妻精品一区2区三区| 黄色a级毛片大全视频| 欧美亚洲日本最大视频资源| 美女高潮喷水抽搐中文字幕| 成人影院久久| 男人舔女人的私密视频| 一级,二级,三级黄色视频| 黑人操中国人逼视频| 宅男免费午夜| 精品欧美一区二区三区在线| 自线自在国产av| 热99re8久久精品国产| 国产视频一区二区在线看| 免费女性裸体啪啪无遮挡网站| 高潮久久久久久久久久久不卡| 村上凉子中文字幕在线| 99精品久久久久人妻精品| 精品福利观看| 嫩草影院精品99| 欧美大码av| 亚洲国产看品久久| 99久久精品国产亚洲精品| 欧美日韩精品网址| 国产成人精品无人区| 国产成人免费无遮挡视频| 亚洲国产精品999在线| 精品国产一区二区久久| 国产精品1区2区在线观看.| 国产精品自产拍在线观看55亚洲| 国产精品久久电影中文字幕| 丰满迷人的少妇在线观看| 妹子高潮喷水视频| 黄色视频,在线免费观看| 伦理电影免费视频| 99久久人妻综合| 亚洲精华国产精华精| 91老司机精品| 久久久久亚洲av毛片大全| 久久久久国内视频| 757午夜福利合集在线观看| 性色av乱码一区二区三区2| 国产高清videossex| 亚洲成人精品中文字幕电影 | 丰满的人妻完整版| 青草久久国产| 成人精品一区二区免费| 88av欧美| 欧美黄色淫秽网站| 国产深夜福利视频在线观看| 亚洲一区二区三区欧美精品| 无限看片的www在线观看| 欧美日韩亚洲综合一区二区三区_| 欧美 亚洲 国产 日韩一| 大香蕉久久成人网| av在线播放免费不卡| 成人影院久久| 深夜精品福利| netflix在线观看网站| 高清毛片免费观看视频网站 | 亚洲,欧美精品.| 亚洲va日本ⅴa欧美va伊人久久| 深夜精品福利| 免费日韩欧美在线观看| 18禁黄网站禁片午夜丰满| av中文乱码字幕在线| 我的亚洲天堂| 国产成人精品在线电影| 国产无遮挡羞羞视频在线观看| 欧美另类亚洲清纯唯美| 国产欧美日韩一区二区三| 亚洲自偷自拍图片 自拍| 日日干狠狠操夜夜爽|